Free ebooks ==> www.Ebook777.com www.Ebook777.com Free ebooks ==> www.Ebook777.com Encryption for Digital Content www.Ebook777.com Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: jajodia@gmu.edu The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series For other titles in this series, go to www.springer.com/series/5576 Aggelos Kiayias • Serdar Pehlivanoglu Encryption for Digital Content Free ebooks ==> www.Ebook777.com Dr Aggelos Kiayias National and Kapodistrian University of Athens Department of Informatics and Telecommunications Panepistimiopolis, Ilisia, Athens 15784 Greece aggelos@kiayias.com Dr Serdar Pehlivanoglu Division of Mathematical Sciences School of Physical and Mathematical Sciences Nanyang Technological University SPMS-MAS-03-01, 21 Nanyang Link Singapore 637371 Email: spehlivan38@gmail.com ISSN 1568-2633 ISBN 978-1-4419-0043-2 e-ISBN 978-1-4419-0044-9 DOI 10.1007/978-1-4419-0044-9 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2010938358 © Springer Science+Business Media, LLC 2010 All rights reserved This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) www.Ebook777.com Preface Today human intellectual product is increasingly — and sometimes exclusively — produced, stored and distributed in digital form The advantages of this capability are of such magnitude that the ability to distribute content digitally constitutes a media revolution that has deeply affected the way we produce, process and share information As in every technological revolution though, there is a flip-side to its positive aspects with the potential to counteract it Indeed, the quality of being digital is a double-edged sword; the ease of production, dissemination and editing also implies the ease of misappropriation, unauthorized propagation and modification Cryptography is an area that traditionally focused on secure communication, authentication and integrity In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques that will enable the further growth of this emerging area of cryptographic research The text is structured in five chapters The first three chapters deal with three different cryptographic techniques that address different problems of digital content distribution • Chapter deals with fingerprinting codes These mechanisms address the problem of source identification in digital content distribution : how is it possible to identify the source of a transmission when such transmission originates from a subset of colluders that belong to a population of potential transmitters The chapter provides a formal treatment of the notion as well as a series of constructions that exhibit different parameter tradeoffs • Chapter deals with broadcast encryption These mechanisms address the problem of distribution control in digital content distribution : how is it possible to restrict the distribution of content to a targeted set of VI Preface recipients without resorting to reinitialising each time the set changes The chapter focuses on explicit constructions of broadcast encryption schemes that are encompassed within the subset cover framework of Naor, Naor and Lotspiech An algebraic interpretation of the framework is introduced that characterises the fundamental property of efficient revocation using tools from partial order theory A complete security treatment of the broadcast encryption primitive is included • Chapter deals with traitor tracing These mechanisms address the problem of source identification in the context of decryption algorithms; among others we discuss how it is possible to reverse engineer “bootlegged” cryptographic devices that carry a certain functionality and trace them back to an original leakage incident Public-key mechanisms such as those of Boneh-Franklin are discussed as well as combinatorial designs of Chor, Fiat and Naor A unified model for traitor tracing schemes in the form of a tracing game is introduced and utilized for formally arguing the security of all the constructions These first three chapters can be studied independently in any order Based on the material laid out in these chapters we then move on to more advanced mechanisms and concepts • Chapter deals with the combination of tracing and revocation in various content distribution settings This class of mechanisms combines the functionalities of broadcast encryption of Chapter and traitor tracing schemes of Chapter giving rise to a more wholesome class of encryption mechanisms for the distribution of digital content A formal model for trace and revoke schemes is introduced that extends the modeling of chapter to include revocation games In this context, we also address the propagation problem in digital content distribution : how is it possible to curb the redistribution of content originating from authorised albeit rogue receivers The techniques of all the first three chapters become critical here • Chapter deals with a class of attacks against trace and revoke schemes called pirate evolution This type of adverse behavior falls outside the standard adversarial modeling of trace and revoke schemes and turns out to be quite ubiquitous in subset cover schemes We illustrate pirate evolution by designing attacks against specific schemes and we discuss how thwarting the attacks affects the efficiency parameters of the systems they apply to The book’s discourse on the material is from first principles and it requires no prior knowledge of cryptography Nevertheless, a level of reader maturity is assumed equivalent to a beginning graduate student in computer science or mathematics The authors welcome feedback on the book including suggestions for improvement and error reports Please send your remarks and comments to: book@encryptiondc.com Preface VII A web-site is maintained for the book where you can find information about its publication, editions and any errata: www.encryptiondc.com The material found in this text is partly based on the Ph.D thesis of the second author Both authors thank Matt Franklin for his comments on a paper published by the authors that its results are presented in this text (Chapter 5) They also thank Juan Garay for suggesting the title of the text Athens and Singapore, August, 2010 Aggelos Kiayias Serdar Pehlivanoglu Free ebooks ==> www.Ebook777.com Contents Fingerprinting Codes 1.1 Preliminaries 1.2 Definition of Fingerprinting Codes 1.3 Applications to Digital Content Distribution 1.4 Constructions 1.4.1 Combinatorial Constructions 1.4.2 The Chor-Fiat-Naor Fingerprinting Codes 1.4.3 The Boneh-Shaw Fingerprinting Codes 1.4.4 The Tardos Fingerprinting Codes 1.4.5 Code Concatenation 1.5 Bibliographic Notes 7 14 18 21 29 32 Broadcast Encryption 2.1 Definition of Broadcast Encryption 2.2 Broadcast Encryption Based on Exclusive-Set Systems 2.2.1 Security 2.2.2 The Subset Cover Framework 2.3 The Key-Poset Framework for Broadcast Encryption 2.3.1 Viewing Set Systems as Partial Orders 2.3.2 Computational Specification of Set Systems 2.3.3 Compression of Key Material 2.4 Revocation in the Key-Poset Framework 2.4.1 Revocation in the key-poset framework: Definitions 2.4.2 A sufficient condition for optimal revocation 2.5 Constructions 2.5.1 Complete Subtree 2.5.2 Subset Difference 2.5.3 Key Chain Tree 2.6 Generic Transformations for Key Posets 2.6.1 Layering Set Systems 2.6.2 X-Transformation 35 36 40 44 49 50 50 55 56 60 61 64 69 69 74 81 88 89 92 www.Ebook777.com Free ebooks ==> www.Ebook777.com 5.4 Pirate Evolution for the Subset Difference Method 195 such that the u-path(Steiner(T, v, v )) hangs off the u -path Observe that u appears in the summation for as many traitors as its rank We will first compute K for the choice of t = 2s (h − s + 1) for s ∈ {0, 1, , h − 1} (we denote it by Ks for the choice of stage s): Since the number of traitors satisfies t = 2s (h − s + 1), we are at the end of the stage s for s = 0, 1, , h − We make three easy observations: (i) Other than the traitors that have path of length at least h − s, all the remaining traitors placed according to above leaking incident have rank This is because no other traitors are placed below their path (which is shorter than h − s) Thus, considering the summation of Theorem 5.15, those traitors will never appear as u in the summation (ii) On the other hand, the traitors with non-zero rank (and their rank is the maximum possible) will appear in the summation as a u node as many as their rank (which equals to the number of traitors hanging off the u -path) For such traitors, except the traitor that placed first, the height(topf (u )) equals to the length of the u -path (ii) Finally, Au = always holds for each traitor u due to the way the traitors are placed (recall the definition of Au given in Lemma 5.14) Based on the above we can now compute Ks : Ks = |(u )-path| (height(topf (u )) + Au ) = h + + u∈T∩S u∈(T\{v})∩S where v is the first traitor path and u is a function of u that equals the traitor such that the u-path hangs off the u -path We next arrange the above summation with respect to u , i.e the below holds due to the relation between u and u in the above equation: rank(u ) · |(u )-path| Ks = h + + u ∈T Now due to the placement of the traitors |(u )-path| equals to the rank of u (this is implied by the observations (i) and (ii) above); thus we obtain: |(u )-path|2 Ks = h + + u ∈T∧rank(u )=0 We now arrange the above summation over |u -path| = h, h − 1, h − 2, Recall also that if |u -path| < h − s then the rank of u is zero and non-zero otherwise s |{u : u ∈ T ∧ |(u )-path| = h − m}| · (h − m)2 Ks = h + + m=0 Due to the claim we have proved above, there will be a single traitor with path of length h and 2m−1 traitors with path of lenght h − m for m > Thus we obtain: www.Ebook777.com 196 Pirate Evolution s 2m−1 · (h − m)2 Ks = h + + h + m=1 Finally we obtain Ks = 2s (h − s + 1)2 + 2s+1 − h − (an easy proof by induction that is left as an exercise) We finally argue about the formula for K given in the statement of the theorem In the case that t ≤ h + 1, we have easily that K equals (t − 1)h + h + = th + which settles the first case Now suppose that 2s (h − s + 1) < t ≤ 2s+1 (h − s) for some s ≥ We have that the number of pirate decoders will be equal to Ks plus the number of decoders that can be produced by the remaining t − 2s (h − s + 1) traitors The traitors placed in the s + contribute h − s − decoders therefore we have that the total number of decoders contributed by them is (t − 2s (h − s + 1))(h − s − 1) So we obtain : Ks + (t − 2s (h − s + 1))(h − s − 1) = 2s+1 (h − s + 2) + t(h − s − 1) − h − This completes the proof The maximum number of generations can be achieved following the leaking incident of Theorem 5.16 in a configuration of the system when there is no revoked user; in this case there is a single element in the partition, namely S containing n users The corollary below follows easily from theorem 5.16 Corollary 5.17 The pirate evolution bound for the SD method satisfies evo[SD, SDDisable] ≥ t log n √ for t ≤ log n It also satisfies that for t ≤ n · log2 n that evo[SD, SDDisable] = Ω(t log n) 5.5 Bibliographic Notes Pirate evolution, as an attack concept against trace and revoke schemes, was introduced by the authors in [62] The susceptibility of the trace and revoke schemes of Naor, Naor and Lotspiech from [87] as it is discussed in Sections 5.3 and 5.4 of this text was also given there Pirate evolution has practical implications For example the advanced access content system (AACS) that is used in Blu-ray disks employs the subset difference method (SD) in clusters of n = 223 nodes It follows that a leaking incident as the one described in Theorem 5.16 with t traitors enables an evolving pirate strategy to generate up to 23·t generations of pirate decoders This means that key leakage incidents can be magnified, i.e., 10 traitor keys can result in up to 230 decoders and so forth This was a “nightmare” scenario as described by the AACS implementers in [59] The suggested proposal to deal with pirate evolution is to magnify the 5.5 Bibliographic Notes 197 √ ciphertext overhead to reach a level of n While this enables only generations of pirate evolution and may still be acceptable given the high capacity of Blu-ray disks it shows that the benefits of the subset difference method (its low ciphertext overhead) are entirely cancelled in practice due to pirate evolution Going beyond, the concept of pirate evolution inspired new types of attack scenarios as the ones introduced by Billet and Phan in [14] References AACS Specifications, 2006 http://www.aacsla.com/specifications/ M Abdalla, D Pointcheval, P.-A Fouque, and D Vergnaud, editors Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 Proceedings, volume 5536 of Lecture Notes in Computer Science, 2009 M Abdalla, Y Shavitt, and A Wool Key management for restricted multicast using broadcast encryption IEEE/ACM Trans Netw., 8(4):443–454, 2000 W Aiello, S Lodha, and R Ostrovsky Fast digital identity revocation (extended abstract) In H Krawczyk, editor, CRYPTO, volume 1462 of Lecture Notes in Computer Science, pages 137–152 Springer, 1998 M Ak, K Kaya, and A A Selcuk Optimal subset-difference broadcast encryption with free riders Information Sciences, 2009 N Attrapadung and H Imai Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations In B K Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 100–120 Springer, 2005 L M Batten and X Yi Efficient broadcast key distribution with dynamic revocation Security and Communication Networks, 1(4):351–362, 2008 M Bellare, editor Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, volume 1880 of Lecture Notes in Computer Science Springer, 2000 O Berkman, M Parnas, and J Sgall Efficient dynamic traitor tracing In SODA, pages 586–595, 2000 10 S Berkovits How to broadcast a secret In EUROCRYPT, pages 535–541, 1991 11 E R Berlekamp and L Welch Error correction of algebraic block codes U.S Patent, Number 4,633,470, 1986 12 I Biehl and B Meyer Protocols for collusion-secure asymmetric fingerprinting (extended abstract) In R Reischuk and M Morvan, editors, STACS, volume 1200 of Lecture Notes in Computer Science, pages 399–412 Springer, 1997 13 O Billet and D H Phan Efficient traitor tracing from collusion secure codes In R Safavi-Naini, editor, ICITS, volume 5155 of Lecture Notes in Computer Science, pages 171–182 Springer, 2008 200 References 14 O Billet and D H Phan Traitors collaborating in public: Pirates 2.0 In A Joux, editor, EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, pages 189–205 Springer, 2009 15 G R Blakley, C Meadows, and G B Purdy Fingerprinting long forgiving messages In H C Williams, editor, CRYPTO, volume 218 of Lecture Notes in Computer Science, pages 180–189 Springer, 1985 16 D Boneh and M K Franklin An efficient public key traitor tracing scheme In Wiener [124], pages 338–353 17 D Boneh and M K Franklin Identity-based encryption from the weil pairing In J Kilian, editor, CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 213–229 Springer, 2001 18 D Boneh, C Gentry, and B Waters Collusion resistant broadcast encryption with short ciphertexts and private keys In Shoup [109], pages 258–275 19 D Boneh and M Hamburg Generalized identity based and broadcast encryption schemes In J Pieprzyk, editor, ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 455–470 Springer, 2008 20 D Boneh, A Kiayias, and H W Montgomery Robust fingerprinting codes : a near optimal construction In ACM Workshop on Digital Rights Management, 2010 21 D Boneh and M Naor Traitor tracing with constant size ciphertext In P Ning, P F Syverson, and S Jha, editors, ACM Conference on Computer and Communications Security, pages 501–510 ACM, 2008 22 D Boneh, A Sahai, and B Waters Fully collusion resistant traitor tracing with short ciphertexts and private keys In S Vaudenay, editor, EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pages 573–592 Springer, 2006 23 D Boneh and J Shaw Collusion-secure fingerprinting for digital data (extended abstract) In D Coppersmith, editor, CRYPTO, volume 963 of Lecture Notes in Computer Science, pages 452–465 Springer, 1995 24 D Boneh and B Waters A fully collusion resistant broadcast, trace, and revoke system In A Juels, R N Wright, and S D C di Vimercati, editors, ACM Conference on Computer and Communications Security, pages 211–220 ACM, 2006 25 R Canetti, J A Garay, G Itkis, D Micciancio, M Naor, and B Pinkas Multicast security: A taxonomy and some efficient constructions In INFOCOM, pages 708–716, 1999 26 R Canetti, T Malkin, and K Nissim Efficient communication-storage tradeoffs for multicast encryption In EUROCRYPT, pages 459–474, 1999 27 H Chabanne, D H Phan, and D Pointcheval Public traceability in traitor tracing schemes In Cramer [31], pages 542–558 28 B Chor, A Fiat, and M Naor Tracing traitors In Y Desmedt, editor, CRYPTO, volume 839 of Lecture Notes in Computer Science, pages 257–270 Springer, 1994 29 B Chor, A Fiat, M Naor, and B Pinkas Tracing traitors IEEE Transactions on Information Theory, 46(3):893–910, 2000 30 I J Cox, J Kilian, F T Leighton, and T Shamoon Secure spread spectrum watermarking for multimedia IEEE Transactions on Image Processing, 6(12):1673–1687, 1997 References 201 31 R Cramer, editor Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, volume 3494 of Lecture Notes in Computer Science Springer, 2005 32 J Daemen and V Rijmen The Design of Rijndael: AES- The Advanced Encryption Standard Springer, New York, 2002 33 C Delerabl´ee Identity-based broadcast encryption with constant size ciphertexts and private keys In ASIACRYPT, pages 200–215, 2007 34 C Delerabl´ee, P Paillier, and D Pointcheval Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys In T Takagi, T Okamoto, E Okamoto, and T Okamoto, editors, Pairing, volume 4575 of Lecture Notes in Computer Science, pages 39–59 Springer, 2007 35 Y Dodis and N Fazio Public key broadcast encryption for stateless receivers In Feigenbaum [41], pages 61–80 36 Y Dodis and N Fazio Public key trace and revoke scheme secure against adaptive chosen ciphertext attack In Y Desmedt, editor, Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, pages 100–115 Springer, 2003 37 Y Dodis, N Fazio, A Kiayias, and M Yung Scalable public-key tracing and revoking In PODC, pages 190–199, 2003 38 C Dwork, M Naor, O Reingold, G N Rothblum, and S P Vadhan On the complexity of differentially private data release: efficient algorithms and hardness results In M Mitzenmacher, editor, STOC, pages 381–390 ACM, 2009 39 N Fazio, A Nicolosi, and D H Phan Traitor tracing with optimal transmission rate In J A Garay, A K Lenstra, M Mambo, and R Peralta, editors, ISC, volume 4779 of Lecture Notes in Computer Science, pages 71–88 Springer, 2007 40 U Feige, P Raghavan, D Peleg, and E Upfal Computing with noisy information SIAM J Comput., 23(5):1001–1018, 1994 41 J Feigenbaum, editor Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, volume 2696 of Lecture Notes in Computer Science Springer, 2003 42 A Fiat and M Naor Broadcast encryption In Stinson [112], pages 480–491 43 A Fiat and T Tassa Dynamic traitor training In Wiener [124], pages 354– 371 44 J Furukawa and N Attrapadung Fully collusion resistant black-box traitor revocable broadcast encryption with short private keys In L Arge, C Cachin, T Jurdzinski, and A Tarlecki, editors, ICALP, volume 4596 of Lecture Notes in Computer Science, pages 496–508 Springer, 2007 45 E Gafni, J Staddon, and Y L Yin Efficient methods for integrating traceability and broadcast encryption In Wiener [124], pages 372–387 46 S D Galbraith, K G Paterson, and N P Smart Pairings for cryptographers Discrete Applied Mathematics, 156(16):3113–3121, 2008 47 J A Garay, J Staddon, and A Wool Long-lived broadcast encryption In Bellare [8], pages 333–352 48 M R Garey, D S Johnson, and L J Stockmeyer Some simplified np-complete problems In STOC, pages 47–63, 1974 202 References 49 C Gentry, Z Ramzan, and D P Woodruff Explicit exclusive set systems with applications to broadcast encryption In FOCS, pages 27–38 IEEE Computer Society, 2006 50 M T Goodrich, J Z Sun, and R Tamassia Efficient tree-based revocation in groups of low-state devices In M K Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 511–527 Springer, 2004 51 V Guruswami and M Sudan Improved decoding of reed-solomon and algebraic-geometric codes In FOCS, pages 28–39, 1998 52 H.-J Guth and B Pfitzmann Error- and collusion-secure fingerprinting for digital data In A Pfitzmann, editor, Information Hiding, volume 1768 of Lecture Notes in Computer Science, pages 134–145 Springer, 1999 53 D Halevy and A Shamir The lsd broadcast encryption scheme In M Yung, editor, CRYPTO, volume 2442 of Lecture Notes in Computer Science, pages 47–60 Springer, 2002 54 H D L Hollmann, J H van Lint, J.-P M G Linnartz, and L M G M Tolhuizen On codes with the identifiable parent property J Comb Theory, Ser A, 82(2):121–133, 1998 55 J Y Hwang, D H Lee, and J Lim Generic transformation for scalable broadcast encryption schemes In Shoup [109], pages 276–292 56 Y H Hwang and P J Lee Efficient broadcast encryption scheme with log-key storage In G D Crescenzo and A D Rubin, editors, Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, pages 281–295 Springer, 2006 57 N.-S Jho, J Y Hwang, J H Cheon, M.-H Kim, D H Lee, and E S Yoo One-way chain based broadcast encryption schemes In Cramer [31], pages 559–574 58 H Jin and J Lotspiech Renewable traitor tracing: A trace-revoke-trace system for anonymous attack In J Biskup and J Lopez, editors, ESORICS, volume 4734 of Lecture Notes in Computer Science, pages 563–577 Springer, 2007 59 H Jin and J B Lotspiech Defending against the pirate evolution attack In F Bao, H Li, and G Wang, editors, ISPEC, volume 5451 of Lecture Notes in Computer Science, pages 147–158 Springer, 2009 60 H Jin and S Pehlivanoglu Traitor tracing without a priori bound on the coalition size In P Samarati, M Yung, F Martinelli, and C A Ardagna, editors, ISC, volume 5735 of Lecture Notes in Computer Science, pages 234– 241 Springer, 2009 61 P Junod, A Karlov, and A K Lenstra Improving the boneh-franklin traitor tracing scheme In S Jarecki and G Tsudik, editors, Public Key Cryptography, volume 5443 of Lecture Notes in Computer Science, pages 88–104 Springer, 2009 62 A Kiayias and S Pehlivanoglu Pirate evolution: How to make the most of your traitor keys In A Menezes, editor, CRYPTO, volume 4622 of Lecture Notes in Computer Science, pages 448–465 Springer, 2007 63 A Kiayias and S Pehlivanoglu On the security of a public-key traitor tracing scheme with sublinear ciphertext size In E Al-Shaer, H Jin, and G L Heileman, editors, Digital Rights Management Workshop, pages 1–10 ACM, 2009 64 A Kiayias and S Pehlivanoglu Tracing and revoking pirate rebroadcasts In Abdalla et al [2], pages 253–271 References 203 65 A Kiayias and S Pehlivanoglu Detecting and revoking pirate redistribution of content U.S Patent, Publication Number 2010/0043081, 2010 66 A Kiayias and S Pehlivanoglu Improving the round complexity of traitor tracing schemes In J Zhou and M Yung, editors, ACNS, Lecture Notes in Computer Science, 2010 67 A Kiayias and M Yung On crafty pirates and foxy tracers In Sander [104], pages 22–39 68 A Kiayias and M Yung Self protecting pirates and black-box traitor tracing In Kilian [72], pages 63–79 69 A Kiayias and M Yung Breaking and repairing asymmetric public-key traitor tracing In Feigenbaum [41], pages 32–50 70 A Kiayias and M Yung Traitor tracing with constant transmission rate In L R Knudsen, editor, EUROCRYPT, volume 2332 of Lecture Notes in Computer Science, pages 450–465 Springer, 2002 71 A Kiayias and M Yung Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract In G L Heileman and M Joye, editors, Digital Rights Management Workshop, pages 9–18 ACM, 2008 72 J Kilian, editor Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science Springer, 2001 73 D Kirovski and F A P Petitcolas Replacement attack on arbitrary watermarking systems In Feigenbaum [41], pages 177–189 74 N Kogan, Y Shavitt, and A Wool A practical revocation scheme for broadcast encryption using smart cards In IEEE Symposium on Security and Privacy, pages 225–235 IEEE Computer Society, 2003 75 H Komaki, Y Watanabe, G Hanaoka, and H Imai Efficient asymmetric self-enforcement scheme with public traceability In K Kim, editor, Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, pages 225–239 Springer, 2001 76 R Kumar, S Rajagopalan, and A Sahai Coding constructions for blacklisting problems without computational assumptions In M J Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pages 609–623 Springer, 1999 77 R Kumar and A Russell A note on the set systems used for broadcast encryption In SODA, pages 470–471, 2003 78 K Kurosawa and Y Desmedt Optimum traitor tracing and asymmetric schemes In EUROCRYPT, pages 145–157, 1998 79 K Kurosawa and T Yoshida Linear code implies public-key traitor tracing In D Naccache and P Paillier, editors, Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, pages 172–187 Springer, 2002 80 M Lee, D Ma, and M Seo Breaking two k-resilient traitor tracing schemes with sublinear ciphertext size In Abdalla et al [2], pages 238–252 81 T Lindkvist Fingerprinting Digital Documents PhD thesis, Linkoping Studies in Science and Technology, 1999 82 D Liu, P Ning, and K Sun Efficient self-healing group key distribution with revocation capability In S Jajodia, V Atluri, and T Jaeger, editors, ACM Conference on Computer and Communications Security, pages 231–240 ACM, 2003 204 References 83 M Luby and J Staddon Combinatorial bounds for broadcast encryption In EUROCRYPT, pages 512–526, 1998 84 T Matsushita and H Imai A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates In P J Lee, editor, ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, pages 260– 275 Springer, 2004 85 M Mitzenmacher and E Upfal Probability and Computing: randomized algorithms and probabilistic analysis Cambridge University Press, London, 2005 86 D Naccache, editor Topics in Cryptology - CT-RSA 2001, The Cryptographer’s Track at RSA Conference 2001, San Francisco, CA, USA, April 812, 2001, Proceedings, volume 2020 of Lecture Notes in Computer Science Springer, 2001 87 D Naor, M Naor, and J Lotspiech Revocation and tracing schemes for stateless receivers In Kilian [72], pages 41–62 88 D Naor, M Naor, and J Lotspiech Revocation and tracing schemes for stateless receivers Electronic Colloquium on Computational Complexity (ECCC), (043), 2002 89 M Naor and B Pinkas Threshold traitor tracing In H Krawczyk, editor, CRYPTO, volume 1462 of Lecture Notes in Computer Science, pages 502–517 Springer, 1998 90 M Naor and B Pinkas Efficient trace and revoke schemes In Y Frankel, editor, Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, pages 1–20 Springer, 2000 91 M Naor and M Yung Public-key cryptosystems provably secure against chosen ciphertext attacks In STOC, pages 427–437 ACM, 1990 92 K Nuida, M Hagiwara, H Watanabe, and H Imai Optimization of tardos’s fingerprinting codes in a viewpoint of memory amount In T Furon, F Cayre, G J Doăerr, and P Bas, editors, Information Hiding, volume 4567 of Lecture Notes in Computer Science, pages 279–293 Springer, 2007 93 C Peikert, A Shelat, and A Smith Lower bounds for collusion-secure fingerprinting In SODA, pages 472–479, 2003 94 B Pfitzmann Trials of traced traitors In R J Anderson, editor, Information Hiding, volume 1174 of Lecture Notes in Computer Science, pages 49–64 Springer, 1996 95 B Pfitzmann and M Schunter Asymmetric fingerprinting (extended abstract) In EUROCRYPT, pages 84–95, 1996 96 B Pfitzmann and M Waidner Asymmetric fingerprinting for larger collusions In ACM Conference on Computer and Communications Security, pages 151– 160, 1997 97 Z Ramzan and D P Woodruff Fast algorithms for the free riders problem in broadcast encryption In C Dwork, editor, CRYPTO, volume 4117 of Lecture Notes in Computer Science, pages 308–325 Springer, 2006 98 R L Rivest All-or-nothing encryption and the package transform In E Biham, editor, FSE, volume 1267 of Lecture Notes in Computer Science, pages 210–218 Springer, 1997 99 R Safavi-Naini and Y Wang Sequential traitor tracing In Bellare [8], pages 316–332 100 R Safavi-Naini and Y Wang New results on frame-proof codes and traceability schemes IEEE Transactions on Information Theory, 47(7):3029–3033, 2001 Free ebooks ==> www.Ebook777.com References 205 101 R Safavi-Naini and Y Wang Traitor tracing for shortened and corrupted fingerprints In Feigenbaum [41], pages 81–100 102 R Safavi-Naini and Y Wang Sequential traitor tracing IEEE Transactions on Information Theory, 49(5):1319–1326, 2003 103 R Sakara and J Furukawa Identity-based broadcast encryption, 2007 Available at the IACR Crypto Archive http://eprint.iacr.org 104 T Sander, editor Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers, volume 2320 of Lecture Notes in Computer Science Springer, 2002 105 B S W Schroder Ordered Sets: An Introduction Birkhauser, Boston, 2003 106 A Shamir Identity-based cryptosystems and signature schemes In CRYPTO, pages 47–53, 1984 107 A T Sherman and D A McGrew Key establishment in large dynamic groups using one-way function trees IEEE Trans Software Eng., 29(5):444–458, 2003 108 V Shoup A proposal for an iso standard for public key encryption (version 1.1), 2001 109 V Shoup, editor Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of Lecture Notes in Computer Science Springer, 2005 110 A Silverberg, J Staddon, and J L Walker Efficient traitor tracing algorithms using list decoding In C Boyd, editor, ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, pages 175–192 Springer, 2001 111 J Staddon, D R Stinson, and R Wei Combinatorial properties of frameproof and traceability codes IEEE Transactions on Information Theory, 47(3):1042– 1049, 2001 112 D R Stinson, editor Advances in Cryptology - CRYPTO ’93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, volume 773 of Lecture Notes in Computer Science Springer, 1994 113 D R Stinson and R Wei Combinatorial properties and constructions of traceability schemes and frameproof codes SIAM J Discrete Math., 11(1):41– 53, 1998 114 D R Stinson and R Wei Key preassigned traceability schemes for broadcast encryption In S E Tavares and H Meijer, editors, Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, pages 144–156 Springer, 1998 115 G Tardos Optimal probabilistic fingerprint codes In STOC, pages 116–125 ACM, 2003 116 G Tardos Optimal probabilistic fingerprint codes J ACM, 55(2), 2008 117 O Telelis and V Zissimopoulos Absolute o(log m) error in approximating random set covering: an average case analysis Inf Process Lett., 94(4):171– 177, 2005 118 V D Tˆ o and R Safavi-Naini Linear code implies public-key traitor tracing with revocation In H Wang, J Pieprzyk, and V Varadharajan, editors, ACISP, volume 3108 of Lecture Notes in Computer Science, pages 24–35 Springer, 2004 www.Ebook777.com 206 References 119 D Tonien and R Safavi-Naini An efficient single-key pirates tracing scheme using cover-free families In J Zhou, M Yung, and F Bao, editors, ACNS, volume 3989 of Lecture Notes in Computer Science, pages 82–97, 2006 120 N R Wagner Fingerprinting In IEEE Symposium on Security and Privacy, pages 18–22, 1983 121 D M Wallner, E J Harder, and R C Agee Key management for multicast: issues and architectures, 1999 Internet Draft 122 P Wang, P Ning, and D S Reeves Storage-efficient stateless group key revocation In K Zhang and Y Zheng, editors, ISC, volume 3225 of Lecture Notes in Computer Science, pages 25–38 Springer, 2004 123 Y Watanabe, G Hanaoka, and H Imai Efficient asymmetric public-key traitor tracing without trusted agents In Naccache [86], pages 392–407 124 M J Wiener, editor Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science Springer, 1999 125 C K Wong, M G Gouda, and S S Lam Secure group communications using key graphs In SIGCOMM, pages 68–79, 1998 126 Y Yacobi Improved boneh-shaw content fingerprinting In Naccache [86], pages 378–391 Index (α, w)-identifier code Advanced Access Content System 102, 169, 196 40, Bifurcation property 159, 168 Broadcast encryption 36, 151, 168 hybrid encryption 36, 38, 39, 102 scheme 152, 153, 155, 157, 160–162, 166, 173, 175 broadcast pattern see revocation instruction Chernoff bound 2, 16, 17, 21, 132 Chopping filters 61, 62, 67, 69, 71 Code concatenation 29 Combinatorial codes 7, 8, 33 frameproof 8, identifiable parent property 8–11 secure frameproof 8, traceability codes 8–10, 12, 13, 15, 31 Complete subtree 69, 102, 172, 176, 186 Coupon collector problem Descendant set w-descendant Diamond property 66, 70, 77, 86, 91, 96 Error correcting code 13, 15, 31 Reed-Solomon Code 13 Exclusive set system 40–43, 45, 46, 50, 102 fully exclusive 49, 50, 55, 60–62, 64–66, 68, 69, 91, 93, 96, 97, 99, 102, 103 Factorizable 61, 65–69, 91, 96, 97, 99, 104 complete subtree 70, 71 factorizability 61, 66, 67, 69, 70, 77, 86, 91, 92, 97 key chain tree 86 layering set systems 91 subset difference 77 X-transformation 96 Fingerprinting code 4, 112, 114, 115, 134, 148, 161, 162, 164, 166 Boneh-Shaw fingerprinting 18, 31, 32 Chor-Fiat-Naor fingerprinting 14, 31 combinatorial fingerprinting 11 concatenated fingerprinting 31 Tardos fingerprinting 21, 32 Fingerprinting properties open fingerprinting 5, 14, 15, 17 public fingerprinting 5, 15 secret fingerprinting 5, 15, 17, 31 Generic transformation 88 layering set systems 89 X-transformation 92 Key chain tree 81, 89, 92, 103 208 Index Key compression 50, 56, 58, 59, 74, 96, 98 complete subtree 70 key chain tree 83 key forest 57–60, 96 layering set systems 91 subset difference 75 Key encapsulation 38, 44, 46, 48, 49, 102, 108, 109, 145 Key indistinguishability 45, 46, 50, 59 Key poset framework 50, 60, 69 complete subtree 69 key chain tree 82 stratified subset difference 103 subset difference 74 Linear length scheme 109, 130, 135, 147, 174 Lower maximal partition 51–53, 64–69, 71, 78, 79, 87, 91, 97–99 Marking assumption 3, 4, 6, 7, 32 robustness 5, 7, 33 Markov’s inequality 3, 27 Multiuser encryption scheme 107–109, 112, 125, 127, 128, 130, 145 Boneh-Franklin scheme 119, 142, 146 Boneh-Naor Scheme 148 Boneh-Naor scheme 114, 135, 141, 145, 147 Chor-Fiat-Naor scheme 113, 135, 147 Kiayias-Yung scheme 115, 139, 141, 145, 148, 149 stateful scheme 108, 115, 128, 148 stateless scheme 108 Partial order set 50, 55, 57, 103 atom 50, 51 atomistic 50, 51, 53, 55 directed set 50, 54, 58, 67 filter 51, 57, 65 ideal 50, 53–55, 64–67 lower set 50–53, 64 PatternCover problem 61, 62, 64 Pirate decoder 126–128, 147, 151, 156, 161, 166, 168, 171, 172, 176, 184, 196 abrupt 129, 147 available 129, 147 history recording 129, 130, 141, 147, 148 resettable 128, 130, 135, 137, 147, 148, 157, 160 Pirate evolution 171, 172, 176, 182, 196 evolving pirate 171–174, 176, 177, 184, 185, 190, 196 immunity 173–175 pirate evolution bound 173, 174, 182, 196 susceptibility 173, 174, 176, 184, 196 Pirate rebroadcast 161, 163, 166, 168, 169 Pirate rebroadcasting 130, 147–149 Poset see Partial order set Revocation 38, 40, 41, 43, 49, 60, 61, 64, 104, 151, 152, 168, 171 generic revocation algorithm 50 optimal revocation 67, 71, 104 revocation algorithm 41, 49, 61 revocation instruction 37–39, 42, 43, 48, 152–157, 162, 166, 168, 172, 175, 177, 178, 189 revocation list 105 revocation problem 61–65, 67, 68 Revocation game 152–156, 159, 160, 168, 171 admissible 152–154, 156, 167 alfresco revocation 154, 162, 164 history recording 154, 161 revocation-suitable relation 155, 156, 159, 160, 164 stateful revocation 154 winnable 153, 155, 156, 171, 173 revocation information see revocation instruction Revocation overhead 153, 155 Separable 61, 64, 65 Stratified subset difference 103 Subset cover framework 49, 102, 103, 157, 168, 171 Subset difference 74, 92, 102, 103, 172, 182–184, 196 Free ebooks ==> www.Ebook777.com Index Trace and Revoke scheme 152, 155–157, 160, 162, 164, 166, 167, 169, 171, 173, 174, 176, 196 Tracing game 123, 124, 126, 145, 152 abrupt adversary 125, 128 admissible adversary 124–126 alfresco tracing 125, 129, 130, 140, 141, 147, 148, 154 history recording adversary 125, 130, 141, 147 209 Stateful Tracing 147 stateful tracing 125 winnable 126–128, 145 Tracing overhead 126, 134, 139, 147, 148 Traitor tracing 107, 151, 152, 168 black box 127, 128 non-black box 126, 127 Watermarking www.Ebook777.com 5–7, 32 ... ebooks ==> www.Ebook777.com Encryption for Digital Content www.Ebook777.com Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason... code 1.3 Applications to Digital Content Distribution Fingerprinting codes play an important role in the area of encryption mechanisms for digital content distribution Encryption mechanisms can... schemes of Chapter giving rise to a more wholesome class of encryption mechanisms for the distribution of digital content A formal model for trace and revoke schemes is introduced that extends the